0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (79)
  • R250 - R500 (115)
  • R500+ (1,464)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology... Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings (Paperback, 2011)
Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, Javier Garcia Villalba, Kirk P. Arnett, …
R1,880 R1,571 Discovery Miles 15 710 Save R309 (16%) Ships in 10 - 15 working days

This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of security technology.

Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30-December 2, 2017,... Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30-December 2, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Srdjan Capkun, Sherman S.M. Chow
R2,085 R1,752 Discovery Miles 17 520 Save R333 (16%) Ships in 10 - 15 working days

This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017. The 20 full papers presented together with 8 short papers were carefully reviewed and selected from 88 submissions. The full papers are organized in the following topical sections: foundation of applied cryptography; processing encrypted data; predicate encryption; credentials and authentication; web security; Bitcoin and blockchain; embedded system security; anonymous and virtual private networks; and wireless and physical layer security.

Advances in Computing and Data Sciences - Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018,... Advances in Computing and Data Sciences - Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I (Paperback, 1st ed. 2018)
Mayank Singh, P.K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer OEren
R2,334 R1,951 Discovery Miles 19 510 Save R383 (16%) Ships in 10 - 15 working days

This two-volume set (CCIS 905 and CCIS 906) constitutes the refereed proceedings of the Second International Conference on Advances in Computing and Data Sciences, ICACDS 2018, held in Dehradun, India, in April 2018. The 110 full papers were carefully reviewed and selected from 598 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.

Blockchain Technology and Applications (Hardcover): Ahmed Banafa Blockchain Technology and Applications (Hardcover)
Ahmed Banafa
R2,246 Discovery Miles 22 460 Ships in 7 - 11 working days

Blockchain is an emerging technology that can radically improve security in transaction networks, it provides the basis for a dynamic distributed ledger that can be applied to save time when recording transactions between parties, remove costs associated with intermediaries, and reduce risks of fraud and tampering. This book explores the fundamentals and applications of Blockchain technology; the transparent, secure, immutable and distributed database used currently as the underlying technology for Cryptocurrency. Decentralized peer-to-peer network, distributed ledger and the trust model that defines Blockchain technology will be explained. Components of Blockchain, its operations, underlying algorithms, and essentials of trust will be defined. Types of Blockchain networks including private and public Blockchain networks will be introduced. Concepts of smart contracts, proof of work and proof of stack will be clarified. The relationship between Blockchain technology, Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and Digital Transformation will be explored in this book. Myths about Blockchain will be exposed and a look at the future of Blockchain will be presented. Topics will be covered in this book: Blockchain technology, Smart contracts, Hashing, SHA-256 Hash, Verification, Validation, Consensus models, Digital Mining, Hard fork, Soft fork, Bitcoin, Ethereum, Proof of work, Proof of stack, Myths about Blockchain, Decentralized peer-to-peer network, Types of Blockchain networks, Hot and Cold Wallets, Double Spend, Decentralized Applications, Transaction networks, Sidechains, 51% attack, Cryptocurrency, Digital transformation, Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and the Future of Blockchain.

Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III (Paperback, 1st ed. 2018)
Hovav Shacham, Alexandra Boldyreva
R2,701 R2,256 Discovery Miles 22 560 Save R445 (16%) Ships in 10 - 15 working days

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018,... Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings (Paperback, 1st ed. 2018)
Bart Preneel, Frederik Vercauteren
R2,299 R1,931 Discovery Miles 19 310 Save R368 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.

Security and Cryptography for Networks - 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008,... Security and Cryptography for Networks - 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings (Paperback, 2008 ed.)
Rafail Ostrovsky, Roberto De Prisco, Ivan Visconti
R2,586 Discovery Miles 25 860 Ships in 7 - 11 working days

This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008.

The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.

Data Security - Laws & Safeguards (Paperback): Paulus R. Wayleith Data Security - Laws & Safeguards (Paperback)
Paulus R. Wayleith
R1,376 R1,090 Discovery Miles 10 900 Save R286 (21%) Ships in 10 - 15 working days

Data security breaches are being reported with increasing regularity. Within the past few years, numerous examples of data such as Social Security, bank account, credit card, and driver's license numbers, as well as medical and student records and many other kinds of data have been compromised. This book presents current issues and laws related to this very important topic.

Desktop Witness - The Do's and Don'ts of Personal Computer Security (Paperback): Michael A Caloyannides Desktop Witness - The Do's and Don'ts of Personal Computer Security (Paperback)
Michael A Caloyannides
R1,036 R726 Discovery Miles 7 260 Save R310 (30%) Ships in 10 - 15 working days

Do you trust your computer?
You shouldn't.

Personal computers are now part of the furniture in homes around the world. We use them for generating, storing and communicating documents and images; we talk to friends and family via email and surf the Web without giving too much thought to the security of our personal information. Unfortunately hacking and computer security are issues which affect all computer users, not just big corporations.

What is a desktop witness?
Your computer stores a record of every document you create, every e-mail you write or receive, which sites you visit on the Internet, even attachments which you don't open.

An unattended computer may reveal your secrets if you leave security vulnerabilities unattended to. It may 'let in' outsiders through your IR port. It 'whispers' behind your back when you are online. Detectable radiation gives away the contents of your screen. Eavesdroppers can hear conversations through your microphone. Your computer remembers everything.

What can you do?
This straight-talking guide, with its easy-to-follow instructions will enable you to regain control and protect your personal information. It will show you the virtues of computer-anonymity, by making you aware of what might motivate people to access your computer in the first place, and it will help you free-up valuable memory by showing you how to really delete the files your computer stores without your knowledge.

A valuable read for any computer user and absolutely essential for any individual, company or practice with information to protect.

The Database Hacker's Handbook - Defending Database Servers (Paperback): David Litchfield, Chris Anley, John Heasman, Bill... The Database Hacker's Handbook - Defending Database Servers (Paperback)
David Litchfield, Chris Anley, John Heasman, Bill Grindlay
R844 R605 Discovery Miles 6 050 Save R239 (28%) Ships in 10 - 15 working days

Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.
In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know
Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts, and programs available for download.

Strategies for Protecting National Critical Infrastructure Assets - A Focus on Problem-Solving (Hardcover): John Sullivant Strategies for Protecting National Critical Infrastructure Assets - A Focus on Problem-Solving (Hardcover)
John Sullivant
R3,111 R2,938 Discovery Miles 29 380 Save R173 (6%) Ships in 10 - 15 working days

Developing solid, thorough infrastructure security assessments in diverse sectors

Drawing on the collective experience of many experts, this definitive reference presents the best methods, techniques, and measurements to help security analysts conduct objective security assessments. It helps readers understand advanced security assessment concepts in today's high-risk world and identify, measure, and prioritize security risks. A comprehensive, practical guide, this resource:

Describes a practical, proven approach that has been used in over 3,000 security assessments in thirty countries

Features three primary sections: an introduction that helps analysts understand today's challenging environment; an overview of security assessment methodology broken down into five specific elements; and details on tailoring the methodology to specific industries

Defines the purpose of the security assessment process, the behavioral and physical sciences brought into play, the techniques used, and measurement and evaluation tools and standards

Presents an S3E comprehensive, system-integrated methodology supported by user-friendly, step-by-step guidance that is complemented by a series of S3E Security Assessment Methodology matrices

Includes chapters dedicated to specific infrastructure sectors: water; energy; transportation; chemical industry and hazardous materials; agriculture and food; banking and finance; and telecommunications

Provides worksheets that facilitate the cataloging and documenting of research data

This book gives consultants, security practitioners, corporate security managers and directors, and others a reliable, hands-on "briefcase" reference to use in theoffice as well as in the field. It's also an ideal text for upper-level students in related courses.

Cybersecurity and Decision Makers - Data Security and Digital Trust (Hardcover): Marie De Freminville Cybersecurity and Decision Makers - Data Security and Digital Trust (Hardcover)
Marie De Freminville
R3,305 Discovery Miles 33 050 Ships in 7 - 11 working days

Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.

Fully Homomorphic Encryption in Real World Applications (Paperback, 1st ed. 2019): Ayantika Chatterjee, Khin Mi Mi Aung Fully Homomorphic Encryption in Real World Applications (Paperback, 1st ed. 2019)
Ayantika Chatterjee, Khin Mi Mi Aung
R2,536 Discovery Miles 25 360 Ships in 7 - 11 working days

This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the 'cloud'. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.

Cybersecurity in Humanities and Social Sciences - A Research Methods Approach (Hardcover): Hugo Loiseau, Daniel Ventre, Hartmut... Cybersecurity in Humanities and Social Sciences - A Research Methods Approach (Hardcover)
Hugo Loiseau, Daniel Ventre, Hartmut Aden
R3,326 Discovery Miles 33 260 Ships in 7 - 11 working days

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology, law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?

Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition): Vincent Nestler, Keith Harrison, Matthew... Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition)
Vincent Nestler, Keith Harrison, Matthew Hirsch, Wm. Arthur Conklin
R1,098 R866 Discovery Miles 8 660 Save R232 (21%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab analysis tests measure your understanding of lab results Key term quizzes help build your vocabulary Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines In this Lab Manual, you'll practice Configuring workstation network connectivity Analyzing network communication Establishing secure network application communication using TCP/IP protocols Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools Defending against network application attacks, including SQL injection, web browser exploits, and email attacks Combatting Trojans, man-in-the-middle attacks, and steganography Hardening a host computer, using antivirus applications, and configuring firewalls Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec Preparing for and detecting attacks Backing up and restoring data Handling digital forensics and incident response Instructor resources available: This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately Virtual machine files Solutions to the labs are not included in the book and are only available to adopting instructors

Color Image Watermarking - Algorithms and Technologies (Hardcover): Qingtang Su Color Image Watermarking - Algorithms and Technologies (Hardcover)
Qingtang Su; Contributions by Tsinghua University Press
R2,345 R1,947 Discovery Miles 19 470 Save R398 (17%) Ships in 10 - 15 working days

This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies. For each algorithm, mathematical foundations are explained with analysis conducted to evaluate performances on robotness and efficiency. Combining theories and practice, it is suitable for information security researchers and industrial engineers.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R3,074 R2,567 Discovery Miles 25 670 Save R507 (16%) Ships in 10 - 15 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Introduction to Cyberdeception (Hardcover, 1st ed. 2016): Neil C. Rowe, Julian Rrushi Introduction to Cyberdeception (Hardcover, 1st ed. 2016)
Neil C. Rowe, Julian Rrushi
R2,161 R1,838 Discovery Miles 18 380 Save R323 (15%) Ships in 10 - 15 working days

This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.

Securing Windows NT/2000 - From Policies to Firewalls (Paperback): Michael A. Simonyi Securing Windows NT/2000 - From Policies to Firewalls (Paperback)
Michael A. Simonyi
R2,434 Discovery Miles 24 340 Ships in 10 - 15 working days

In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.

The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The book includes the steps required to define a corporate security policy, how to implement that policy, and how to structure the project plan. Tables, charts, and work templates provide a starting point to begin assessing and implementing a solution that will fit the unique needs of your organization. Part two provides the reader with practical hands-on applications for the preparation, installation, and tuning of Windows NT/2000 operating systems.

Securing Windows NT/2000 provides step-by-step instructions that guide you through performing a secure installation and in preparing the system for secure operation on the Internet. Although a multitude of firewall application software can be used in conjunction with the sections detailing the securing of the operating system, Check Point FireWall-1/VPN-1 is used as it best demonstrates the effectiveness of translating the corporate security policy into a practical reality.

About the Author:

Michael Simonyi (www.stonewallem.com) is an IT professional working for private sector enterprise organizations. He has over 12 years of practical and theoretical experience, from mainframe systems to PC client/server networks. His areas of expertise center on practical systems management, networking, databases, and application architecture, with emphasis on quality.

The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (Paperback, 1st ed. 2016): Peter Y.... The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (Paperback, 1st ed. 2016)
Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater
R2,544 R2,317 Discovery Miles 23 170 Save R227 (9%) Ships in 10 - 15 working days

This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn's 80th birthday. The title of this books leans on the title of a serious history of cryptology named "The Codebreakers", written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology - past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols.

Cryptography Made Simple (Hardcover, 1st ed. 2016): Nigel Smart Cryptography Made Simple (Hardcover, 1st ed. 2016)
Nigel Smart
R1,187 R1,080 Discovery Miles 10 800 Save R107 (9%) Ships in 10 - 15 working days

In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The author balances a largely non-rigorous style - many proofs are sketched only - with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading. This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study by professionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus.

Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico,... Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff
R1,766 R1,484 Discovery Miles 14 840 Save R282 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2015. The 22 full papers presented were carefully reviewed and selected from 39 submissions. They feature the outcome of the Second Workshop on Bitcoin Research, BITCOIN 2015, the Third Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2015, and the First Workshop on Wearable Security and Privacy, Wearable 2015.

Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1,... Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers (Hardcover, 1st ed. 2017)
Gilbert Peterson, Sujeet Shenoi
R2,682 R2,296 Discovery Miles 22 960 Save R386 (14%) Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics XIII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues; Mobile and Embedded Device Forensics; Network and Cloud Forensics; Threat Detection and Mitigation; Malware Forensics; Image Forensics; and Forensic Techniques. This book is the thirteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of sixteen edited papers from the Thirteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2017. Advances in Digital Forensics XIII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson, Chair, IFIP WG 11.9 on Digital Forensics, is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.

Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I (Paperback, 1st ed. 2019)
Yuval Ishai, Vincent Rijmen
R2,502 R2,205 Discovery Miles 22 050 Save R297 (12%) Ships in 10 - 15 working days

The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.

Fully Homomorphic Encryption in Real World Applications (Hardcover, 1st ed. 2019): Ayantika Chatterjee, Khin Mi Mi Aung Fully Homomorphic Encryption in Real World Applications (Hardcover, 1st ed. 2019)
Ayantika Chatterjee, Khin Mi Mi Aung
R3,489 R3,005 Discovery Miles 30 050 Save R484 (14%) Ships in 10 - 15 working days

This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the 'cloud'. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Truth Machine - The Blockchain and…
Michael J. Casey, Paul Vigna Paperback  (1)
R399 R304 Discovery Miles 3 040
Security Awareness - Applying Practical…
Mark Ciampa Paperback R746 R641 Discovery Miles 6 410
Mastering Blockchain - Unlocking the…
Lorne Lantz, Daniel Cawrey Paperback R1,422 R1,085 Discovery Miles 10 850
Tribe of Hackers Red Team - Tribal…
Marcus J. Carey, Jennifer Jin Paperback R496 R371 Discovery Miles 3 710
The Mathematics of Secrets…
Joshua Holden Paperback R464 R379 Discovery Miles 3 790
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,206 R1,019 Discovery Miles 10 190
CompTIA CySA+ Practice Tests - Exam…
Mike Chapple, David Seidl Paperback R910 R733 Discovery Miles 7 330
Oracle9i RMAN Backup & Recovery
Robert Freeman, Matthew Hart Paperback R1,278 R1,005 Discovery Miles 10 050
Mastering Corda - Blockchain for Java…
Jamiel Sheikh Paperback R1,438 R1,116 Discovery Miles 11 160
You CAN Stop Stupid - Stopping Losses…
Ira Winkler, Dr. Tracy Celaya Brown Paperback R778 R627 Discovery Miles 6 270

 

Partners